Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

Relaunching BDRCloud: Cost-Effective Cloud-Hosted Backup & Recovery Solution - BETA Available Now!

We are excited to announce the relaunch of BDRCloud, now more cost-effective than ever! BDRCloud is a comprehensive backup and recovery solution designed for MSPs and businesses, simplifying data protection with cloud-based management.

Threat Context Monthly: Executive intelligence briefing for December 2024

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from December.

ISO 27001:2022 Controls List: Everything You Need to Know

Imagine a world where you can easily protect your company’s important data while ensuring compliance with strict security guidelines. ISO 27001:2022 promises just that. Because data breaches are becoming more expensive and cyber threats are growing, companies need to strengthen their security posture. Just in 2024, the average cost of a single data breach reached an astonishing $4.88 million. ISO 27001:2022 offers a proven framework to safeguard your organization’s information assets.

PCI DSS 4.0.1: A Comprehensive Guide to Successfully Meeting Requirements 6.4.3 and 11.6.1

PCI DSS 4 Compliance requires a clear understanding of the latest requirements, particularly Requirement 6.4.3 and 11.6.1, which emphasize the importance of JavaScript monitoring for maintaining secure payment environments. For AppSec, Infosec, or ISA/QSA professionals, staying on top of PCI DSS 4.0.1 can feel overwhelming, but protecting payment card data leaves no room for errors.

Palo Alto Networks Releases Critical Update for PAN-OS DoS Vulnerability

Cybersecurity authorities continuously grapple with the challenges posed by sophisticated cyberattacks. Palo Alto Networks has lately preached a critical denial-of-service (DoS) vulnerability in its PAN-OS software. Tracked as CVE-2024-3393, this critical vulnerability (CVSS score: 8.7) poses serious risks to enterprises relying on PAN-OS and Prisma Access for their cybersecurity infrastructure.

What is a Cyber Fusion Center and Why You Need One

Advanced security technologies make it possible to detect, analyze, and respond to incidents with impressive precision. Yet even the best tools can’t bridge the gaps created by disjointed responsibilities, siloed workflows, and competing priorities. This lack of cohesion weakens your security posture and increases exposure to sophisticated attacks that thrive on disorganization. 41% of organizations struggle to manage cybersecurity collaboratively.

What is External Attack Surface Management (EASM)?

External attack surface management (EASM) is the continuous exercise of managing cybersecurity risks associated with an organization’s external-facing digital assets. The process includes monitoring, identifying, reducing, and mitigating risks present across an organization’s external attack surface.
Sponsored Post

Capturing Network Traffic anytime

Capturing network traffic is usually done either for security reasons or to troubleshoot networking issues. But by the time you initiate a network capture (either manually or automatically) it’s often too late already – the train has already left the station. Point in case: Say your SIEM (obviously EventSentry) detects abnormal or suspicious behavior in a log and a network capture is initiated.